|
|
Books > Computing & IT
The internet of things (IoT) revolution has given rise to smart
cities and villages all over the world. With technology
advancements such as cloud computing, fog computing, and
software-defined networking, it is necessary to examine ways that
these environments can implement innovation for cost-effective
citizen services and e-governance. Also, as cyber-physical systems
are becoming more vulnerable with IoT attacks threatening their
security and privacy, there is an even greater need for solutions
that offer protection for all of these advancing technologies. The
Handbook of Research on Implementation and Deployment of IoT
Projects in Smart Cities is an essential research publication that
combines theory and practice, reflecting on advancing technologies
for the automation, protection, and sustainability of urban
environments. Highlighting a wide range of topics such as
blockchain, smart grid, and sustainability, this book is ideal for
researchers, academicians, scientists, engineers, programmers, IT
consultants, professionals, and policymakers.
In order to study living organisms, scientists not only study them
at an overall macroscopic scale but also on a more detailed
microscopic scale. This observation, pushed to its limits, consists
of investigating the very center of each cell, where we find the
molecules that determine the way it functions: DNA
(deoxyribonucleic acid) and RNA (ribonucleic acid). In an organism,
DNA carries the genetic information, which is called the genome. It
is represented as four-letter sequences using the letters A, C, G
and T; based on these sequences, computer methods described in this
book can answer fundamental questions in bioinformatics. This book
explores how to quickly find sequences of a few hundred nucleotides
within a genome that may be made up of several billion, how to
compare those sequences and how to reconstruct the complete
sequence of a genome. It also discusses the problems of identifying
bacteria in a given environment and predicting the structure of RNA
based on its sequence.
Strategy, Leadership and AI in the Cyber Ecosystem investigates the
restructuring of the way cybersecurity and business leaders engage
with the emerging digital revolution towards the development of
strategic management, with the aid of AI, and in the context of
growing cyber-physical interactions (human/machine co-working
relationships). The book explores all aspects of strategic
leadership within a digital context. It investigates the
interactions from both the firm/organization strategy perspective,
including cross-functional actors/stakeholders who are operating
within the organization and the various characteristics of
operating in a cyber-secure ecosystem. As consumption and reliance
by business on the use of vast amounts of data in operations
increase, demand for more data governance to minimize the issues of
bias, trust, privacy and security may be necessary. The role of
management is changing dramatically, with the challenges of
Industry 4.0 and the digital revolution. With this intelligence
explosion, the influence of artificial intelligence technology and
the key themes of machine learning, big data, and digital twin are
evolving and creating the need for cyber-physical management
professionals.
E-health applications such as tele-medicine, tele-radiology,
tele-ophthalmology, and tele-diagnosis are very promising and have
immense potential to improve global healthcare. They can improve
access, equity, and quality through the connection of healthcare
facilities and healthcare professionals, diminishing geographical
and physical barriers. One critical issue, however, is related to
the security of data transmission and access to the technologies of
medical information. Currently, medical-related identity theft
costs billions of dollars each year and altered medical information
can put a person's health at risk through misdiagnosis, delayed
treatment or incorrect prescriptions. Yet, the use of hand-held
devices for storing, accessing, and transmitting medical
information is outpacing the privacy and security protections on
those devices. Researchers are starting to develop some
imperceptible marks to ensure the tamper-proofing, cost effective,
and guaranteed originality of the medical records. However, the
robustness, security and efficient image archiving and retrieval of
medical data information against these cyberattacks is a
challenging area for researchers in the field of e-health
applications. Intelligent Data Security Solutions for e-Health
Applications focuses on cutting-edge academic and industry-related
research in this field, with particular emphasis on
interdisciplinary approaches and novel techniques to provide
security solutions for smart applications. The book provides an
overview of cutting-edge security techniques and ideas to help
graduate students, researchers, as well as IT professionals who
want to understand the opportunities and challenges of using
emerging techniques and algorithms for designing and developing
more secure systems and methods for e-health applications.
The technology of Artificial Intelligence is here, and moving fast,
without ethical standards in place. A Blueprint for the Regulation
of Artificial Intelligence Technologies leans on classical western
philosophy for its ethical grounding. Values such as conscience,
rights, equity, and discrimination, establish a basis for
regulatory standards. Multiple international agencies with
governing interests are compared. The development of ethical
standards is suggested through two new non-governmental
organizations (NGOs). The first is to develop standards that evolve
from practice, while the second acts as an ombudsman to settle
abuse. Both NGOs are envisioned to cooperate with regulators. More
than seeking a perfect solution, the book aims to balance the
tension between conflicting interests, with the goal to keep this
dangerously wonderful technology under global human control. For
that to materialize, the technology needs to have a seat on the
table of global ethics. The final chapter lists fourteen thinking
points to achieve an ethics balance for new technologies.
Machine learning and data analytics can be used to inform
technical, commercial and financial decisions in the maritime
industry. Applications of Machine Learning and Data Analytics
Models in Maritime Transportation explores the fundamental
principles of analysing maritime transportation related practical
problems using data-driven models, with a particular focus on
machine learning and operations research models. Data-enabled
methodologies, technologies, and applications in maritime
transportation are clearly and concisely explained, and case
studies of typical maritime challenges and solutions are also
included. The authors begin with an introduction to maritime
transportation, followed by chapters providing an overview of ship
inspection by port state control, and the principles of data driven
models. Further chapters cover linear regression models, Bayesian
networks, support vector machines, artificial neural networks,
tree-based models, association rule learning, cluster analysis,
classic and emerging approaches to solving practical problems in
maritime transport, incorporating shipping domain knowledge into
data-driven models, explanation of black-box machine learning
models in maritime transport, linear optimization, advanced linear
optimization, and integer optimization. A concluding chapter
provides an overview of coverage and explores future possibilities
in the field. The book will be especially useful to researchers and
professionals with expertise in maritime research who wish to learn
how to apply data analytics and machine learning to their fields.
Sustainable Wireless Network-on-Chip Architectures focuses on
developing novel Dynamic Thermal Management (DTM) and Dynamic
Voltage and Frequency Scaling (DVFS) algorithms that exploit the
advantages inherent in WiNoC architectures. The methodologies
proposed-combined with extensive experimental
validation-collectively represent efforts to create a sustainable
NoC architecture for future many-core chips. Current research
trends show a necessary paradigm shift towards green and
sustainable computing. As implementing massively parallel
energy-efficient CPUs and reducing resource consumption become
standard, and their speed and power continuously increase, energy
issues become a significant concern. The need for promoting
research in sustainable computing is imperative. As hundreds of
cores are integrated in a single chip, designing effective packages
for dissipating maximum heat is infeasible. Moreover, technology
scaling is pushing the limits of affordable cooling, thereby
requiring suitable design techniques to reduce peak temperatures.
Addressing thermal concerns at different design stages is critical
to the success of future generation systems. DTM and DVFS appear as
solutions to avoid high spatial and temporal temperature variations
among NoC components, and thereby mitigate local network hotspots.
Introduction to EEG- and Speech-Based Emotion Recognition Methods
examines the background, methods, and utility of using
electroencephalograms (EEGs) to detect and recognize different
emotions. By incorporating these methods in brain-computer
interface (BCI), we can achieve more natural, efficient
communication between humans and computers. This book discusses how
emotional states can be recognized in EEG images, and how this is
useful for BCI applications. EEG and speech processing methods are
explored, as are the technological basics of how to operate and
record EEGs. Finally, the authors include information on EEG-based
emotion recognition, classification, and a proposed EEG/speech
fusion method for how to most accurately detect emotional states in
EEG recordings.
Interest in big data has swelled within the scholarly community as
has increased attention to the internet of things (IoT). Algorithms
are constructed in order to parse and analyze all this data to
facilitate the exchange of information. However, big data has
suffered from problems in connectivity, scalability, and privacy
since its birth. The application of deep learning algorithms has
helped process those challenges and remains a major issue in
today's digital world. Advanced Deep Learning Applications in Big
Data Analytics is a pivotal reference source that aims to develop
new architecture and applications of deep learning algorithms in
big data and the IoT. Highlighting a wide range of topics such as
artificial intelligence, cloud computing, and neural networks, this
book is ideally designed for engineers, data analysts, data
scientists, IT specialists, programmers, marketers, entrepreneurs,
researchers, academicians, and students.
Ascend AI Processor Architecture and Programming: Principles and
Applications of CANN offers in-depth AI applications using Huawei's
Ascend chip, presenting and analyzing the unique performance and
attributes of this processor. The title introduces the fundamental
theory of AI, the software and hardware architecture of the Ascend
AI processor, related tools and programming technology, and typical
application cases. It demonstrates internal software and hardware
design principles, system tools and programming techniques for the
processor, laying out the elements of AI programming technology
needed by researchers developing AI applications. Chapters cover
the theoretical fundamentals of AI and deep learning, the state of
the industry, including the current state of Neural Network
Processors, deep learning frameworks, and a deep learning
compilation framework, the hardware architecture of the Ascend AI
processor, programming methods and practices for developing the
processor, and finally, detailed case studies on data and
algorithms for AI.
Up-to-date coverage of every topic on the CEH v11 exam This
effective self-study guide covers 100% of the EC Council's
Certified Ethical Hacker Version 11 exam objectives. The book
discusses the latest ethical hacking tools, techniques, and
exploits. Readers will find learning objectives at the beginning of
each chapter, step-by-step exercises, exam tips, practice exam
questions, and in-depth explanations. An integrated test
preparation system based on proven pedagogy, CEH Certified Ethical
Hacker All-in-One Exam Guide, Fifth Edition covers all five phases
of ethical hacking: reconnaissance, gaining access, enumeration,
maintaining access, and covering tracks. Readers will learn about
malware, hacking Web applications and mobile platforms, cloud
computing vulnerabilities, and more. Designed to help candidates
pass the exam with ease, this authoritative resource also serves as
an essential on-the-job reference. Complete coverage of all CEH v11
exam objectives Includes online access to the Total Tester
customizable practice exam software containing 300 practice
questions Written by an experienced educator with more than 20
years of experience in the field
Advances in Computers carries on a tradition of excellence,
presenting detailed coverage of innovations in computer hardware,
software, theory, design, and applications. The book provides
contributors with a medium in which they can explore their subjects
in greater depth and breadth than journal articles typically allow.
The articles included in this book will become standard references,
with lasting value in this rapidly expanding field.
Throughout the 1990s, artists experimented with game engine
technologies to disrupt our habitual relationships to video games.
They hacked, glitched, and dismantled popular first-person shooters
such as Doom (1993) and Quake (1996) to engage players in new kinds
of embodied activity. In Unstable Aesthetics: Game Engines and the
Strangeness of Art Modding, Eddie Lohmeyer investigates historical
episodes of art modding practices-the alteration of a game system's
existing code or hardware to generate abstract spaces-situated
around a recent archaeology of the game engine: software for
rendering two and three-dimensional gameworlds. The contemporary
artists highlighted throughout this book-Cory Arcangel, JODI,
Julian Oliver, Krista Hoefle, and Brent Watanabe, among others --
were attracted to the architectures of engines because they allowed
them to explore vital relationships among abstraction, technology,
and the body. Artists employed a range of modding
techniques-hacking the ROM chips on Nintendo cartridges to produce
experimental video, deconstructing source code to generate
psychedelic glitch patterns, and collaging together surreal
gameworlds-to intentionally dissect the engine's operations and
unveil illusions of movement within algorithmic spaces. Through key
moments in game engine history, Lohmeyer formulates a rich
phenomenology of video games by focusing on the liminal spaces of
interaction among system and body, or rather the strangeness of art
modding.
In the digital economy, a new type of business activity, digital
entrepreneurship, has developed rapidly and required breakthrough
technologies such as blockchain, big data, cloud technologies, and
more. There is a need for a comprehensive resource that provides
all-encompassing insight into the essence, special aspects, models,
and international best practices of e-business based on various
digital technologies in various high-tech markets. Digital
Technologies for Entrepreneurship in Industry 4.0 provides
theoretical frameworks and recent results of research in this
sphere. It substantiates digital entrepreneurship, discusses the
practical experience of its implementation, and develops the
scientific and methodological recommendations for the development
of its infrastructural provision and regulation of provision of its
competitiveness. Covering topics such as investment attractiveness,
corporate reporting modernization, and public-private partnership
mechanisms, this premier reference source is an excellent resource
for entrepreneurs, business executives and managers, investors, IT
managers, students and faculty of higher education, researchers,
and academicians.
DIRECTING, DIALOGUE AND ACTING From Richard Williams' The
Animator's Survival Kit comes key chapters in mini form. The
Animator's Survival Kit is the essential tool for animators.
However, sometimes you don't want to carry the hefty expanded
edition around with you to your college or studio if you're working
on just one aspect of it that day. The Animation Minis take some of
the most essential chapters and make them available in smaller,
lightweight, hand-bag/backpack size versions. Easy to carry. Easy
to study. This Mini focuses on Directing, Dialogue and Acting. As a
director, whatever your idea is, you want to put it over, so the
main thing with directing is to be clear - very clear. The
Director's job is to hold everything together so that the animator
can give the performance. Richard Williams shows how that
performance can be achieved with flexibility and contrast. With
Acting and Dialogue, the temptation is to try to do everything at
once - Williams' advice: do one thing at a time.
Learn how to create, train, and tweak large language models (LLMs) by building one from the ground up!
In Build a Large Language Model (from Scratch) bestselling author Sebastian Raschka guides you step by step through creating your own LLM. Each stage is explained with clear text, diagrams, and examples. You’ll go from the initial design and creation, to pretraining on a general corpus, and on to fine-tuning for specific tasks.
Build a Large Language Model (from Scratch) teaches you how to:
- Plan and code all the parts of an LLM
- Prepare a dataset suitable for LLM training
- Fine-tune LLMs for text classification and with your own data
- Use human feedback to ensure your LLM follows instructions
- Load pretrained weights into an LLM
Build a Large Language Model (from Scratch) takes you inside the AI black box to tinker with the internal systems that power generative AI. As you work through each key stage of LLM creation, you’ll develop an in-depth understanding of how LLMs work, their limitations, and their customization methods. Your LLM can be developed on an ordinary laptop, and used as your own personal assistant.
|
|